REGISTER

email 14 48

oktatn default Download

At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance.

bitsighttn pdf Download (2.19 MB)

How to rethink your policies, processes, and plans to mitigate cyber risk in an increasingly remote workforce.

bitsighttn pdf Download (3.69 MB)

In this white paper, we take a closer look at corporate-associated residential IP addresses (WFH-RO IPs) and discover attributes that pose uniquecybersecurity risks as compared to in-office corporate networks.

oktatn default Download

This document provides an introduction to Okta’s approach to managing security throughout the following chapters:

CCTNacl pdf Download (979 KB)

Cybersecurity risk ratings are rapidly becoming a critical component of third-party cyber risk management programs. Security leaders are beginning to use them to find quantitative data to scrutinize the statements made about security by their third parties, supporting business critical commercial discussions and risk decisions. Increasingly, security leaders are seeking to operationalize this data to build more robust information from which they can base their risk management decisions upon.

CCTNacl pdf Download (887 KB)

Maintaining strong vendor relationships is critical in today’s highly connected and globalized market. But for some organizations, supply chains have become ungovernably large, and the challenges facing procurement and risk management teams are only growing.

lg pdf Download (14.55 MB)

Do enterprise risks keep CEOs awake at night? According to the 100 CEOs who participated in LogicGate’s inaugural Enterprise Risk Management survey, the answer is an emphatic—if slightly groggy—YES.

CCTNacl default Download

This is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party security risk.

 

recorded futureView

While third-party relationships undoubtedly add business value, they also introduce significant new risk and compliance challenges for organizations. On top of that, as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time external data to feed their governance, risk, and compliance (GRC) technology.

recorded futureDownload

As leading companies in every industry today are undergoing digital transformation, the lines are blurring between any one organization and its partners, suppliers, vendors, and other third parties. In this new report, ESG examines how these business relationships can introduce new risks that need to be identified and managed “as if these third parties were part of the enterprise itself.”

 

CCTNacl pdf Download (822 KB)

ProcessUnity’s Vendor Risk Management software protects companies and their brands by reducing risks from third-party vendors and suppliers. Our program helps customers effectively and efficiently assess and monitor both new and existing vendors – from initial due diligence and onboarding
to termination.

CCTNacl pdf Download (2.70 MB)

When one of your vendors takes a hit, you could take the fall. But do you have a clear picture of your vulnerability?

CCTNacl pdf Download (3.45 MB)

Companies that use compliance technology saved an average of $1.45M in compliance costs in 2019. Additionally, integrated risk management programs
achieve higher growth than less integrated programs, according to a 2019 risk management survey from Deloitte.

CCTNacl pdf Download (1.96 MB)

While many enterprises have taken tremendous strides in recent years to measure and manage the cyber risk present within their own IT systems, they struggle to extend that vigilance to third-party risk.

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

Go to top